Question

Assuming that pessimistic locking is being used, but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem.



$1.99
Sales0
Views27
Comments0
  • CreatedDecember 03, 2014
  • Files Included
Post your question
5000